CHOIR 发表于 2025-3-23 11:34:59
B. D. Gonska,A. Schaumann,S. Purrersymmetric-key primitives so far and it remains an open problem how to build such ciphers..In this work, we propose the MALICIOUS framework, a new method to build tweakable block ciphers that have backdoors hidden which allows to retrieve the secret key. Our backdoor is differential in nature: a spec和谐 发表于 2025-3-23 14:11:17
http://reply.papertrans.cn/15/1476/147536/147536_12.pngIRATE 发表于 2025-3-23 18:01:13
http://reply.papertrans.cn/15/1476/147536/147536_13.pngendarterectomy 发表于 2025-3-24 01:50:33
M. Chimienti,S. Barbieri,G. Guazzottily interesting since it proposes differential side channel resistance. In this paper, we present practical distinguishers of the full 6-step version of the underlying permutations of ., namely . and ., solving challenges proposed by the designers on the permutation. We also propose practical forgeriHAIRY 发表于 2025-3-24 02:34:15
http://reply.papertrans.cn/15/1476/147536/147536_15.pngintimate 发表于 2025-3-24 07:04:51
http://reply.papertrans.cn/15/1476/147536/147536_16.png讽刺 发表于 2025-3-24 12:26:47
https://doi.org/10.1007/978-3-030-56877-1artificial intelligence; authentication; ciphertexts; communication; computer networks; computer systems;热情的我 发表于 2025-3-24 18:11:06
978-3-030-56876-4International Association for Cryptologic Research 2020巩固 发表于 2025-3-24 22:22:03
B. D. Gonska,A. Schaumann,S. PurrerWe present several improvements to the framework of differential-linear attacks with a special focus on ARX ciphers. As a demonstration of their impact, we apply them to Chaskey and ChaCha and we are able to significantly improve upon the best attacks published so far.scrape 发表于 2025-3-25 02:05:47
http://reply.papertrans.cn/15/1476/147536/147536_20.png